Which of the following wireless security measures, although widely implemented, does not provide strong security?
A. IPSec
B. WPA2
C. MAC address filtering
D. 802.1x
Which of the following is a specialized piece of hardware designed to encrypt and decrypt user traffic?
A. Proxy server
B. TDR
C. Smart jack
D. VPN concentrator
Which of the following would be the BEST solution for an IDS to monitor known attacks?
A. Host-based
B. Signature-based
C. Network-based
D. Behavior-based
Users are reporting that external web pages load slowly. The network administrator determines that the Internet connection is saturated. Which of the following is BEST used to decrease the impact of web surfing?
A. Caching
B. Load balancing
C. Port filtering
D. Traffic analyzer
Joe, a technician, suspects a virus has infected the network and is using up bandwidth. He needs to quickly determine which workstation is infected with the virus. Which of the following would BEST help Joe?
A. Web server
B. Syslog
C. Network sniffer
D. SNMP
A network administrator is implementing a wireless honeypot to detect wireless breach attempts. The honeypot must implement weak encryption to lure malicious users into easily breaking into the network. Which of the following should the network administrator implement on the WAP?
A. WPA
B. WPA2
C. WEP
D. VPN
Which of the following network appliances will only detect and not prevent malicious network activity?
A. IDS
B. Network sniffer
C. IPS
D. Firewall
Which of the following describes a single computer that is setup specifically to lure hackers into revealing their methods, and preventing real attacks on the production network?
A. Evil twin
B. Honeypot
C. DMZ
D. Honeynet
A network technician has configured a new firewall with a rule to deny UDP traffic. Users have reported that they are unable to access Internet websites. The technician verifies this using the IP address of a popular website. Which of the following is the MOST likely cause of the error?
A. Implicit deny
B. HTTP transports over UDP
C. Website is down
D. DNS server failure
Users at a remote site are unable to establish a VPN to the main office. At which of the following layers of the OSI model does the problem MOST likely reside?
A. Presentation
B. Application
C. Physical
D. Session
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-005 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.